v6.0rc9 released

What’s new in 6.0rc9 (2013-Feb-08 08:15):

*) ospf - fixed Summary-LSA prefix length check for OSPFv3, was not
accepting valid LSAs;
*) certificates - fix broken certificate handling (bug introduced in rc8) in all related programs;
*) fixed - bgp tcp-md5-key crash on CCR;
*) fixed interfaces list sometimes showing up empty;
*) fixed - ip addrs could be inactive for some types of interfaces which are added as bridge ports and disabled;

_Note for Cloud Core Router users: after upgrading, please also upgrade the RouterBOOT with the console command “/system routerboard upgrade”
This is a highly recommended upgrade for all CCR series users. First upload this file, then run command: http://www.mikrotik.com/download/share/tilegx_3_04_2.fwf_

http://www.mikrotik.com/download

Dear Normis!

The v6.0rc9 tile all packages contain RouterBOOT 3.03 version.
This version of RouterBOOT same in older v6.0rc version…

Thx.

Attila

with 6.0rc9 on RB2011UAS, RB1100AHx2 and RB1200, the command "/ip dns cache-size=2048KiB" still results in an error.

Because of this, I can't deploy it with my automatic provisioning software.

\

Another note, slightly off topic: this small flaw happens also on TILE platform with 6.0rc7.

[admin@gw1-vpr] > > /ip dns set cache-size=2048KiB
value of cache-size contains invalid trailing characters
[admin@gw1-vpr] > /system resource print
uptime: 2w6d18h53m31s
version: 6.0rc7
build-time: Jan/18/2013 13:04:05
free-memory: 3072.7MiB
total-memory: 3964.0MiB
cpu: > tilegx
cpu-count: 36
cpu-frequency: 1200MHz
cpu-load: 0%
free-hdd-space: 424.1MiB
total-hdd-space: 512.0MiB
architecture-name: tile
board-name: CCR1036-12G-4S
platform: MikroTik

I will try upgrading to rc9 later (can't reboot now).

“/ip dns set cache-size=2048”

works fine in RC9

RGDS

Sure, but if you add “KiB” at the end (that it is what “/ip dns export verbose” outputs), the command is not accepted, it’s a (small but annoying) bug.

Any chance that 6rd is going to find its way into one of the RouterOS v6 RC builds? at&t and many large ISPs like it are now using 6rd to deploy IPv6. Not having it in RouterOS is a big issue for our clients that use RouterOS on the edge.

In RC9 I have still problem with all interfaces, they not appear in Interfaces and RB got 100% cpu usage, RB 433AH

Upgraded a point to point nstreme link from 6.0rc6 to rc9. One end used RB433 and the other used an Alix board (x86). Both with R52Hn cards. Link is set up using VPLS over a AP to Station link. AES encryption.

The RB433 looks fine with about 2% CPU, but the Alix board jumped up to 80% CPU. Under rc6 cpu load on the Alix board was about 5% with traffic. Sending about 15Mbps. Nothing too complex.

We don’t have many Alix systems anymore, but it might be something you want to look at.

RC09 , all ethernet not appear and can not access via winbox

/interface print command not responding :frowning:

tried at MAC? Which your RB?

For these problems that I’m afraid to upgrade my RB.

Routerboot is already 3.03.

NAT is not working on CCR with rc9.

Excuse my ignorance, what most mean by CCR?

CCR = Cloud Core Router :wink:

http://routerboard.com/CCR1036-12G-4S

Is it normal, that E-mail password easy to see in .backup file? And Wi-Fi key too?
Is it not protected format?
EmailPassword.jpg

I think it’s not problem :slight_smile:

"Important! The backup file contains sensitive information, do not store your backup files inside the router’s Files directory, instead, download them, and keep them in a secure location. "
Citation from: http://wiki.mikrotik.com/wiki/Manual:Configuration_Management

a) hard to notice
b) Applies to RouterOS: 2.9, v3, v4

I have something which most of you might not know…

Read especially part III.
I bet ROS 5.x, 6.x are about the same security level…

http://felinemenace.org/~andrewg/MikroTik_Router_Security_Analysis_Part1/
http://felinemenace.org/~andrewg/MikroTik_Router_Security_Analysis_Part2/
http://felinemenace.org/~andrewg/MikroTik_Router_Security_Analysis_Part3/

still think it`s nothing?

imagine me breaking into your tower somewhere “in the woods” and stealing your microtik

I will gain access to your network and I will also gain access to all your routers because of same password used everywhere.

It will take me 5 minutes to scan your network for unpatched windows and by using some script kiddy tool like metasploit to hack a few customers in few hours, stealing their data.

This is how a WISP can be put out of service in one dark night…

So be warned!

Someone already updated RC9 in some RB450G? everything is normal with no problems?

In security once you have physical access it’s game over, Also this requires you to extract the file from the flash of an RB or the HDD of a x86 box (Alot easier on x86)

The winbox entry is interesting but again requires a compromised PC at which point it’s just time. It’s another attack vector that requires social engineering to exploit and it’s much easy to get granny to install bonzai buddy than it is a network engineer with user/pass for main routers.

Bit of a storm in a teacup really.